Abstract

Vehicular ad-hoc network (VANET) has been gaining importance due to the fast growing technology as well as its requirements in intelligent transportation systems (ITS) and vehicular social network (VSN). VANET facilitates vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communication and improves the ride quality with value added services. The number of connected vehicles is expected to grow to a huge number with enormous exchange of safety and non-safety messages which are susceptible to security and privacy threat. To ensure secured communication, VANET must implement an authentication protocol to resist the attack and preserve the privacy. In this paper, a detailed discussion on the taxonomy for authentication schemes in VANET has been presented. The authentication schemes have been compared with security, privacy and scalability requirement. The use of recent technologies such as 5G, 5G-SDN, and Blockchain to design authentication schemes with low cost, and low communication, computational overhead has been discussed. Finally, the paper concludes with open challenges in VANET authentication. This paper is expected to open new avenues for researchers working in the domain of VANETs.

Highlights

  • The emergence of huge number of connected vehicles and vehicular social network draws attention from both academia and industry

  • Intelligent transportation systems play a pivotal role in managing road traffic; provide innovative and comprehensive services to control these undesirable events for connected vehicle in (VANET)

  • Manvi et al [5] have discussed a survey on authentication scheme and made a comparative analysis based on the security attack, security requirement and computational and communication overhead

Read more

Summary

A Comprehensive Review of Authentication Schemes in Vehicular Adhoc Network

BF.aAnzsaaml5,1S, Se.nKio.rYMaedmavb2e, rN, .IEPEriEyadarshi, Member, IEEE, S.

INTRODUCTION
Our Contributions Our contributions to this survey are highlighted as
UNDERSTANDING THE VANET
VANET Characteristics
RECENT ADVANCEMENTS IN VANET AUTHENTICATION
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.